Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- The Catholic University of America, Columbus School of Law (6)
- University of Michigan Law School (3)
- University of Miami Law School (2)
- American University Washington College of Law (1)
- Brooklyn Law School (1)
-
- Case Western Reserve University School of Law (1)
- Chicago-Kent College of Law (1)
- Cleveland State University (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University College of Law (1)
- Northwestern Pritzker School of Law (1)
- Penn State Dickinson Law (1)
- Pepperdine University (1)
- Schulich School of Law, Dalhousie University (1)
- Seattle University School of Law (1)
- St. Mary's University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Massachusetts School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Oklahoma College of Law (1)
- Vanderbilt University Law School (1)
- Publication Year
- Publication
-
- Catholic University Journal of Law and Technology (6)
- Michigan Telecommunications & Technology Law Review (2)
- American University National Security Law Brief (1)
- Brooklyn Journal of International Law (1)
- Canadian Journal of Law and Technology (1)
-
- Chicago-Kent Law Review (1)
- Dickinson Law Review (2017-Present) (1)
- FIU Law Review (1)
- Global Business Law Review (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Law and Mobility (1)
- Journal of Law, Technology, & the Internet (1)
- Nevada Law Journal (1)
- Northwestern Journal of Technology and Intellectual Property (1)
- Oklahoma Journal of Law and Technology (1)
- Pepperdine Law Review (1)
- Seattle University Law Review (1)
- St. Mary's Law Journal (1)
- Touro Law Review (1)
- University of Massachusetts Law Review (1)
- University of Miami Inter-American Law Review (1)
- University of Miami Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
Articles 1 - 29 of 29
Full-Text Articles in Entire DC Network
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
University of Miami Law Review
Despite the increasing amount of data breaches, there is no liability for parties who do not adequately protect victim’s information. In federal court, plaintiffs must show that their injury was concrete, particularized, and imminent. But, when plaintiffs’ information has been stolen, but not yet criminally used, they may be unable to establish a right to relief. Victims face challenges when seeking damage for this future harm, because despite their destroyed privacy, they may not have evidence of a perpetrator’s actual misuse of purloined data. This Article analyzes multiple court decisions, generally in the setting of class-actions, and discusses outcomes of …
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
The Development Of Digital Mass Surveillance In Norway: The Emergence Of A Surveillance State?, Iris Nguyên Duy
The Development Of Digital Mass Surveillance In Norway: The Emergence Of A Surveillance State?, Iris Nguyên Duy
FIU Law Review
No abstract provided.
Flattening The Curve While Protecting Our Right To Privacy: How The United States Can Implement The Digital Contract Tracing Efforts Used In East Asia, Evan Morris
Global Business Law Review
This paper looks at the digital contact tracing efforts implemented by other nations and assesses how similar measures could operate under enacted and proposed United States laws. Part I overviews the history of contact tracing and its effectiveness in prior disease outbreaks. Part II delves into the digital contact tracing efforts implemented by South Korea and Singapore. These summaries include: the digital contact tracing efforts taken, the laws that authorize these efforts, the public’s reception, and the overall effectiveness of the efforts. Part III overviews the digital contact tracing efforts in the United States, including proposed legislation aimed at user …
Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder
Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder
Journal of Law and Mobility
This paper identifies some of the core privacy considerations raised by smart cities – government surveillance and data security in Part I. Then, Part II proposes a set of core principles for smart cities to consider in the development and deployment of smart cities to address privacy concerns. These principles include: (A) human-centric approaches to smart cities design and implementation, (B) transparency for city residents, (C) privacy by design, (D) anonymization and deidentification, (E) data minimization and purpose specification, (F) trusted data sharing, and (G) cybersecurity resilience.
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
St. Mary's Law Journal
Abstract forthcoming.
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Journal of Digital Forensics, Security and Law
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …
Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer
Modern Privacy Advocacy: An Approach At War With Privacy Itself?, Justin "Gus" Hurwitz, Jamil N. Jaffer
Pepperdine Law Review
This Article argues that the modern concept of privacy itself, particularly as framed by some of its most ardent advocates today, is fundamentally incoherent. The Article highlights that many common arguments made in support of privacy, while initially seeming to protect this critical value, nonetheless undermine it in the long run. Using both recent and older examples of applying classic privacy advocacy positions to key technological innovations, the authors demonstrate how these positions, while seemingly privacy-enhancing at the time, actually resulted in outcomes that were less beneficial for consumers and citizens, including from a purely privacy-focused perspective. As a result, …
The Law Of The Tetrapods, Henry T. Greely
The Law Of The Tetrapods, Henry T. Greely
Vanderbilt Journal of Entertainment & Technology Law
Should there be such a thing as "Technology Law"? This Article explores that question in two ways. It first looks at four substantive issues that appear across many different areas of technology law: privacy, security, property, and responsibility. It then examines five questions that frequently recur about how to regulate very different new technologies. These questions include which agency should regulate, whether regulation should focus on before or after marketing, what jurisdiction should regulate, how relevant new information will be gained and used, and how-politically-good regulation can be enacted. This Article concludes that it may make sense to develop a …
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
Catholic University Journal of Law and Technology
This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Catholic University Journal of Law and Technology
Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.
This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …
Privacy And Outrage, Jordan M. Blanke
Privacy And Outrage, Jordan M. Blanke
Journal of Law, Technology, & the Internet
It is not an understatement that technology has dramatically altered virtually every aspect of our life in recent years. While technology has always driven change, these changes are occurring more rapidly and more extensively than ever before. We are fully entrenched in the world of Big Data, the Internet of Things, and Smart Cities – and we are never going back. As always, society and its laws must evolve, but it is not always an easy process.
The notion of privacy has certainly changed in our data-driven world and continues to change daily. While it has always been difficult to …
Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy
Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy
Catholic University Journal of Law and Technology
In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of …
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
Oklahoma Journal of Law and Technology
No abstract provided.
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Canadian Journal of Law and Technology
Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
Brooklyn Journal of International Law
In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …
Enhancing The Teaching Of Lawyering Skills And Perspectives Through Virtual World Engagement, Andrea M. Seielstad
Enhancing The Teaching Of Lawyering Skills And Perspectives Through Virtual World Engagement, Andrea M. Seielstad
University of Massachusetts Law Review
Educators from around the globe are rapidly utilizing and transforming virtual worlds, such as Second Life, with innovative teaching strategies. Mediation and dispute resolution, and associated communication and problem-solving skills, are particularly well suited for developing in virtual worlds, as are other lawyering skills such as, interviewing, counseling, and trial advocacy. The opportunities for students and faculty to engage in cross-cultural exchange and networking are another selling feature of virtual world engagement. Virtual worlds offer particular promise for those seeking innovative and cost-effective ways to integrate more professional training and skills development into the law school curriculum. Moreover, as more …
Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik
Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik
Touro Law Review
This Comment focuses on the dangers of social media sites when a person gains access to another's online account through two different methods: (1) stealing the third party's password, or (2) creating a completely fake profile and subsequently impersonating that person.
Facilitando The Cloud: Data Protection Regulation As A Driver Of National Competitiveness In Latin America, Horacio Gutiérrez, Daniel Korn
Facilitando The Cloud: Data Protection Regulation As A Driver Of National Competitiveness In Latin America, Horacio Gutiérrez, Daniel Korn
University of Miami Inter-American Law Review
No abstract provided.
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Michigan Telecommunications & Technology Law Review
A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …
Privacy Implications Of Smart Meters, Cheryl Dancey Balough
Privacy Implications Of Smart Meters, Cheryl Dancey Balough
Chicago-Kent Law Review
Many people worry about the erosion of privacy in our society given developments in technology, but that loss of privacy may take a quantum leap as electric "smart meters" make it possible for strangers to know on a real-time basis what is occurring in our houses and apartments. Perhaps the greatest concern is that current laws and regulations do not fully protect us from this unprecedented threat to two of our most basic rights—to be left alone in our own homes and to control personal information. Utility companies across the country are replacing conventional electric meters with smart meters designed …
Privacy Concerns Regarding The Monitoring Of Instant Messaging In The Workplace: Is It Big Brother Or Just Business?, Ira David
Nevada Law Journal
No abstract provided.
The Emergence Of Website Privacy Norms, Steven A. Hetcher
The Emergence Of Website Privacy Norms, Steven A. Hetcher
Michigan Telecommunications & Technology Law Review
Part I of the Article will first look at the original privacy norms that emerged at the Web's inception in the early 1990s. Two groups have been the main contributors to the emergence of these norms; the thousands of commercial websites on the early Web, on the one hand, and the millions of users of the early Web, on the other hand. The main structural feature of these norms was that websites benefitted through the largely unrestricted collection of personal data while consumers suffered injury due to the degradation of their personal privacy from this data collection. In other words, …